Networks - Data Security/Technology

Risk Strategies Company
Thursday, August 8, 2019

Ransomware has become prevalent and can cause significant downtime and leaving businesses with no choice but to pay the ransom.

Erin Hulse, Founder – Deviate Consulting, LLC
Wednesday, August 7, 2019

The software selection process can be overwhelming and time-consuming. What are the options, what functionality do they offer, and how much do they cost?

Rob Rosenzweig, Risk Strategies Company
Friday, August 2, 2019

With the implementation of California Consumer Privacy Act (CCPA) set to go into effect January 1, 2020, anyone doing businesses with California residents should not only be preparing their digital strategies to comply with the new law, they should also be assessing their risk and reviewing their

Aaron Turner, Risk Strategies Company
Wednesday, July 31, 2019

While far-reaching cyberattacks targeting the Internet of Things (IoT) devices hasn’t happened yet, it will in the not-too-distant future.

Bob Courtemanche, Risk Strategies Company
Tuesday, July 23, 2019

Posting fabulous vacation moments on Facebook—from a boat in Belize, to the top of a mountain at Chamonix—might be a fun way to share experiences with your friends, but it’s also a great way to let bad actors know your home is empty and ripe for a break-in.

Warner Norcross & Judd
Friday, July 19, 2019

Much of a company’s communication occurs through email these days, and most professionals know that, in the event of a lawsuit, courts can order companies to turn over files and emails during the discovery process.

Rachel Tarko Hudson, Partner – Sheppard, Mullin, Richter and Hampton LLP
Wednesday, June 26, 2019

Last year California passed the most sweeping change to US privacy law to date. The California Consumer Privacy Act (CCPA) comes into force on January 1, 2020 and brings with it many new compliance requirements for companies who collect, share and use the personal information of Californians.

Technology Trends for Family Offices

Jun 24 2019 -

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

Cyber Vulnerability Assessments & Penetration Testing: Tools, Techniques and Best Practices

Jun 21 2019 -

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »